PodcastsTechnologyThinkstScapes

ThinkstScapes

Jacob Torrey, [email protected], haroon meer, marco slaviero
ThinkstScapes
Latest episode

18 episodes

  • ThinkstScapes

    ThinkstScapes Research Roundup - Q4 - 2025

    12/02/2026 | 33 mins.
    Networking beyond plug-and-play
    GET /large file HTTP/1.1: Connection-Based TCP Amplification Attacks
    Yepeng Pan, Lars Richter, and Christian Rossow
    [Paper] [Code]
    WAFFLED: Exploiting Parsing Discrepancies to Bypass Web Application Firewalls
    Seyed Ali Akhavani, Bahruz Jabiyev, Ben Kallus, Cem Topcuoglu, Sergey Bratus, and Engin Kirda
    [Paper] [Code]
    Excuse me, what precise time is it?
    Oliver Ettlin
    [Video]
    Cut To The QUIC: Slashing QUIC's Performance With A Hash DoS
    Paul Bottinelli
    [Slides] [Code]
    High-impact security at the foundations
    Understanding the Security Impact of CHERI on the Operating System Kernel
    Zhaofeng Li, Jerry Zhang, Joshua Tlatelpa-Agustin, Xiangdong Chen, and Anton Burtsev
    [Code] [Paper]
    CUDA de Grâce: Owning AI Cloud Infrastructure with GPU Exploits
    Valentina Palmiotti and Samuel Lovejoy
    [Video]
    Defeating KASLR by Doing Nothing at All
    Seth Jenkins
    [Blog post] [Code]
    Build a Fake Phone, Find Real Bugs: Qualcomm GPU Emulation and Fuzzing with LibAFL QEMU
    Romain Malmain and Scott Bauer
    [Code] [Video]
    Rust in Android: move fast and fix things 
    Jeff Vander Stoep
    [Blog post] [Rust course]
    Skynet Starter Kit: From Embodied AI Jailbreak to Remote Takeover of Humanoid Robots
    Shipei Qu, Zikai Xu, and Xuangan Xiao
    [Video]
    Wins and losses with LLMs and security
    Scaling agentic architectures for autonomous security testing and offensive operations
    Jason Garman, Jake Coyne, and Aaron Brown
    [Slides] [Code]
    Forced Descent: Google Antigravity Persistent Code Execution Vulnerability
    Aaron Portnoy
    [Blog post]
    Flaw And Order: Finding The Needle In The Haystack Of CodeQL Using LLMs
    Simcha Kosman
    [Slides] [Blog post] [Code]
    Rescuing the Unpoisoned: Efficient Defense against Knowledge Corruption Attacks on RAG Systems
    Kim Minseok, Lee Hankook, and Koo Hyungjoon
    [Code] [Paper]
    Whisper Leak: A novel side-channel attack on remote language models 
    Jonathan Bar Or and Geoff McDonald
    [Blog post] [Paper] [Code]
    Nifty sundries
    Format-Preserving Compression-Tolerating Authenticated Encryption for Images
    Alexandra Boldyreva, Kaishuo Cheng, and Jehad Hussein
    [Slides] [Paper]
    Why Quantum Cryptanalysis is Bollocks
    Peter Gutmann
    [Video] [Slides]
    Unmasking Organizations' Security Postures: Insights From Phishing-Resistant Authentication
    Fei Liu
    [Slides]
    Those Who Do Not Learn from Advisories Are Doomed to Repeat Them
    Louis Nyffenegger
    [Video]
  • ThinkstScapes

    ThinkstScapes Research Roundup - Q3 - 2025

    11/11/2025 | 38 mins.
    Q3’25 ThinkstScapes
    Microsoft-induced security woes
    One Token to rule them all - obtaining Global Admin in every Entra ID tenant via Actor tokens
    Dirk-jan Mollema
    [Blog post]
    Turning Microsoft's Login Page into our Phishing Infrastructure
    Keanu Nys
    [Slides] [Video]
    You snooze you lose: RPC-Racer winning RPC endpoints against services
    Ron Ben Yizhak
    [Slides] [Code] [Video]
    Internal Domain Name Collision 2.0
    Philippe Caturegli
    [Slides] [Video]
    Logs are not always as they appear
    Source IP Spoofing in Cloud Logs: A Hands-On Look Across AWS, Azure, and GCP
    Eliav Livneh
    [Video]
    I'm in Your Logs Now, Deceiving Your Analysts and Blinding Your EDR
    Olaf Hartong
    [Slides] [Code]
    From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion
    Shu-Hao Tung
    [Slides] [Paper] [Video]
    Autobots roll out!
    Automating software security with LLMs
    Tyler Nighswander
    [Site] [Code] [Video]
    Agents Built From Alloys
    Albert Ziegler
    [Blog post] [Dataset]
    AI Agents for Offsec with Zero False Positives
    Brendan Dolan-Gavitt
    [Slides]
    Are CAPTCHAs Still Bot-hard? Generalized Visual CAPTCHA Solving with Agentic Vision Language Model
    Xiwen Teoh, Yun Lin, Siqi Li, Ruofan Liu, Avi Sollomoni, Yaniv Harel, and Jin Song Dong
    [Site] [Paper] [Code]
    Good vibrations
    Invisible Ears at Your Fingertips: Acoustic Eavesdropping via Mouse Sensors
    Mohamad Habib Fakih, Rahul Dharmaji, Youssef Mahmoud, Halima Bouzidi, and Mohammad Abdullah Al Faruque
    [Site] [Paper]
    TimeTravel: Real-time Timing Drift Attack on System Time Using Acoustic Waves
    Jianshuo Liu, Hong Li, Haining Wang, Mengjie Sun, Hui Wen, Jinfa Wang, and Limin Sun
    [Paper]
    Nifty sundries
    Crescent library brings privacy to digital identity systems
    Christian Paquin, Guru-Vamsi Policharla, and Greg Zaverucha
    [Blog post] [Paper] [Code]
    Journey to the center of the PSTN: How I became a phone company, and how you can too
    Enzo Damato
    [Slides] [Video]
    Safe Harbor or Hostile Waters: Unveiling the Hidden Perils of the TorchScript Engine in PyTorch
    Ji'an Zhou and Lishuo Song
    [Slides]
    Ghosts in the Machine Check – Conjuring Hardware Failures for Cross-ring Privilege Escalation
    Christopher Domas
    [Slides] [Code] [Video]
    Machine Against the RAG: Jamming Retrieval-Augmented Generation with Blocker Documents
    Avital Shafran, Roei Schuster, and Vitaly Shmatikov
    [Paper] [Code]
    Inverting the Xorshift128+ random number generator
    Scott Contini
    [Blog post] [Code]
  • ThinkstScapes

    ThinkstScapes Research Roundup - Q2 - 2025

    04/08/2025 | 34 mins.
    ThinkstScapes Q2’25
    Networking is always tricky
    Beyond the Horizon: Uncovering Hosts and Services Behind Misconfigured Firewalls
    Qing Deng, Juefei Pu, Zhaowei Tan, Zhiyun Qian, and Srikanth V. Krishnamurthy
    [Paper]
    0.0.0.0 Day: Exploiting Localhost APIs From The Browser
    Avi Lumelsky and Gal Elbaz
    [Blog post] [Video]
    Local Mess: Covert Web-to-App Tracking via Localhost on Android
    Aniketh Girish, Gunes Acar, Narseo Vallina-Rodriguez, Nipuna Weerasekara, and Tim Vlummens
    [Website]
    Transport Layer Obscurity: Circumventing SNI Censorship on the TLS-Layer
    Niklas Niere, Felix Lange, Juraj Somorovsky, and Robert Merget
    [Code] [Paper]
    Language models large and small
    The road to Top 1: How XBOW did it
    Nico Waisman
    [Blog post]
    AI and Secure Code Generation
    Dave Aitel and Dan Geer
    [Blog post]
    A look at CloudFlare’s AI-coded OAuth library
    Neil Madden
    [Blog post]
    How I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation
    Sean Heelan
    [Blog post] [Code]
    Enhancing Secret Detection in Cybersecurity with Small LMs
    Danny Lazarev and Erez Harush
    [Blog post] [Video]
    BAIT: Large Language Model Backdoor Scanning by Inverting Attack Target
    Guangyu Shen, Siyuan Cheng, Zhuo Zhang, Guanhong Tao, Kaiyuan Zhang, Hanxi Guo, Lu Yan, Xiaolong Jin, Shengwei An, Shiqing Ma, and Xiangyu Zhang
    [Code] [Paper]
    When parsing goes right, and when it goes wrong
    3DGen: AI-Assisted Generation of Provably Correct Binary Format Parsers
    Sarah Fakhoury, Markus Kuppe, Shuvendu K. Lahiri, Tahina Ramananandro, and Nikhil Swamy
    [Slides] [Paper]
    GDBMiner: Mining Precise Input Grammars on (Almost) Any System
    Max Eisele, Johannes Hägele, Christopher Huth, and Andreas Zeller
    [Paper] [Code]
    Parser Differentials: When Interpretation Becomes a Vulnerability
    Joernchen / Joern Schneeweisz
    [Slides] [Video]
    Inbox Invasion: Exploiting MIME Ambiguities to Evade Email Attachment Detectors
    Jiahe Zhang, Jianjun Chen, Qi Wang, Hangyu Zhang, Shengqiang Li, Chuhan Wang, Jianwei Zhuge, and Haixin Duan
    [Slides] [Paper] [Code]
    Nifty sundries
    Impostor Syndrome: Hacking Apple MDMs Using Rogue Device Enrolments
    Marcell Molnár and Magdalena Oczadły
    [Slides] 
    Your Cable, My Antenna: Eavesdropping Serial Communication via Backscatter Signals
    Lina Pu, Yu Luo, Song Han, and Junming Diao
    [Paper]
    GoSonar: Detecting Logical Vulnerabilities in Memory Safe Language Using Inductive Constraint Reasoning
    Md Sakib Anwar, Carter Yagemann, and Zhiqiang Lin
    [Paper] [Code]
    Show Me Your ID(E)!: How APTs Abuse IDEs
    Tom Fakterman and Daniel Frank
    [Slides] [Video]
    Inviter Threat: Managing Security in a new Cloud Deployment Model
    Meg Ashby
    [Video]
    Carrier Tokens—A Game-Changer Towards SMS OTP Free World!
    Kazi Wali Ullah
    [Slides] [Code] [Video]
  • ThinkstScapes

    ThinkstScapes Research Roundup - Q1 - 2025

    30/04/2025 | 29 mins.
    ThinkstScapes Q1’25
    Putting it into practice
    Homomorphic Encryption across Apple features
    Rehan Rishi, Haris Mughees, Fabian Boemer, Karl Tarbe, Nicholas Genise, Akshay Wadia, and Ruiyu Zhu
    [Code] [Paper] [Video]
    Beyond the Hook: A Technical Deep Dive into Modern Phishing Methodologies
    Alexandre Nesic
    [Blog] 
    How to Backdoor Large Language Models
    Shrivu Shankar
    [Blog] [Code] 
    Buccaneers of the Binary: Plundering Compiler Optimizations for Decompilation Treasure
    Zion Leonahenahe Basque
    [Code] [Video]
    Software Screws Around, Reverse Engineering Finds Out: How Independent, Adversarial Research Informs Government Regulation
    Andy Sellars and Michael A. Specter
    [Video] [Website]
    Understanding things all the way down
    PhantomLiDAR: Cross-modality Signal Injection Attacks against LiDAR
    Zizhi Jin, Qinhong Jiang, Xuancun Lu, Chen Yan, Xiaoyu Ji, and Wenyuan Xu
    [Paper] [Demo Videos]
    Full-stack Reverse Engineering of the Original Microsoft Xbox
    Markus Gaasedelen
    [Video]
    Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China
    Shencha Fan, Jackson Sippe, Sakamoto San, Jade Sheffey, David Fifield, Amir Houmansadr, Elson Wedwards, and Eric Wustrow
    [Paper]
    Scaling software (in)security
    Low-Effort Denial of Service with Recursion
    Alexis Challande and Brad Swain
    [Paper] [Video]
    Is this memory safety here in the room with us?
    Thomas Dullien (Halvar Flake)
    [Slides] [Video]
    How to gain code execution on millions of people and hundreds of popular apps
    Eva
    [Blog]
    Node is a loader
    Tom Steele
    [Blog]
    Mixing up Public and Private Keys in OpenID Connect deployments
    Hanno Böck
    [Blog] [Code]
    Nifty sundries
    Will It Run? Fooling EDRs With Command Lines Using Empirical Data
    Wietze Beukema
    [Tool site] [Code] [Video]
    Homoglyph-Based Attacks: Circumventing LLM Detectors
    Aldan Creo
    [Paper] [Code] [Video]
    28 Months Later - The Ongoing Evolution of Russia's Cyber Operations
    The Grugq
    [Slides] [Podcast interview]
    ‘It's Not Paranoia If They're Really After You’: When Announcing Deception Technology Can Change Attacker Decisions
    Andrew Reeves and Debi Ashenden
    [Paper]
    Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack
    Ziqiang Wang, Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, Mengyuan Li, Ganqiu Du, Ke Xu, and Jianping Wu
    [Paper] [Code]
  • ThinkstScapes

    ThinkstScapes Research Roundup - Q4 - 2024

    20/02/2025 | 37 mins.
    ThinkstScapes Q4’24
    Wins and losses in the Microsoft ecosystem
    Pointer Problems - Why We’re Refactoring the Windows Kernel
    Joe Bialek
    [Video]
    Defending off the land
    Casey Smith, Jacob Torrey, and Marco Slaviero
    [Slides] [Code]
    Unveiling the Power of Intune: Leveraging Intune for Breaking Into Your Cloud and On-Premise
    Yuya Chudo
    [Slides] [Code]
    From Simulation to Tenant Takeover
    Vaisha Bernard
    [Video]
    From Convenience to Contagion: The Libarchive Vulnerabilities Lurking in Windows 11
    NiNi Chen
    [Slides] [Video]
    LLM hype continues, as do the security issues
    Things we learned about LLMs in 2024
    Simon Willison
    [Blog]
    AI Meets Git: Unmasking Security Flaws in Qodo Merge
    Nils Amiet
    [Slides] [Video] [Blog]
    Suicide Bot: New AI Attack Causes LLM to Provide Potential “Self-Harm” Instructions
    Gadi Evron
    [Blog]
    Diving deep, then diving deeper
    Breaking NATO Radio Encryption
    Lukas Stennes
    [Paper] [Video]
    Exploiting File Writes in Hardened Environments
    Stefan Schiller
    [Blog] [Video]
    Hacking yourself a satellite - recovering BEESAT-1
    PistonMiner
    [Video]
    IRIS: Non-Destructive Inspection of Silicon
    Andrew 'bunnie' Huang
    [Blog] [Paper] [Video]
    SQL Injection Isn't Dead
    Paul Gerste
    [Slides] [Video]
    Nifty sundries
    What Developers Get for Free?
    Louis Nyffenegger
    [Video]
    Dialing into the Past: RCE via the Fax Machine – Because Why Not?
    Rick de Jager and Carlo Meijer
    [Video]
    Broken isolation - Draining your Credentials from Popular macOS Password Managers
    Wojciech Reguła
    [Slides] [Video]
    I'll Be There for You! Perpetual Availability in the A8 MVX System
    André Rösti, Stijn Volckaert, Michael Franz, and Alexios Voulimeneas
    [Code] [Paper]
    Exploring and Exploiting an Android “Smart POS” Payment Terminal
    Jacopo Jannone
    [Video]

More Technology podcasts

About ThinkstScapes

The ThinkstScapes podcast aims to distill and disseminate the cybersecurity research published worldwide. Our researchers track and review hundreds and thousands of talks (so you don't have to) and then bring this to you in small, digestible chunks.
Podcast website

Listen to ThinkstScapes, The Big Tech Show and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features
Social
v8.7.2 | © 2007-2026 radio.de GmbH
Generated: 3/9/2026 - 9:57:22 AM